client_test.go 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269
  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package agent
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "errors"
  9. "net"
  10. "os"
  11. "os/exec"
  12. "strconv"
  13. "testing"
  14. "code.google.com/p/go.crypto/ssh"
  15. )
  16. func startAgent(t *testing.T) (client Agent, socket string, cleanup func()) {
  17. bin, err := exec.LookPath("ssh-agent")
  18. if err != nil {
  19. t.Skip("could not find ssh-agent")
  20. }
  21. cmd := exec.Command(bin, "-s")
  22. out, err := cmd.Output()
  23. if err != nil {
  24. t.Fatalf("cmd.Output: %v", err)
  25. }
  26. /* Output looks like:
  27. SSH_AUTH_SOCK=/tmp/ssh-P65gpcqArqvH/agent.15541; export SSH_AUTH_SOCK;
  28. SSH_AGENT_PID=15542; export SSH_AGENT_PID;
  29. echo Agent pid 15542;
  30. */
  31. fields := bytes.Split(out, []byte(";"))
  32. line := bytes.SplitN(fields[0], []byte("="), 2)
  33. line[0] = bytes.TrimLeft(line[0], "\n")
  34. if string(line[0]) != "SSH_AUTH_SOCK" {
  35. t.Fatalf("could not find key SSH_AUTH_SOCK in %q", fields[0])
  36. }
  37. socket = string(line[1])
  38. line = bytes.SplitN(fields[2], []byte("="), 2)
  39. line[0] = bytes.TrimLeft(line[0], "\n")
  40. if string(line[0]) != "SSH_AGENT_PID" {
  41. t.Fatalf("could not find key SSH_AGENT_PID in %q", fields[2])
  42. }
  43. pidStr := line[1]
  44. pid, err := strconv.Atoi(string(pidStr))
  45. if err != nil {
  46. t.Fatalf("Atoi(%q): %v", pidStr, err)
  47. }
  48. conn, err := net.Dial("unix", string(socket))
  49. if err != nil {
  50. t.Fatalf("net.Dial: %v", err)
  51. }
  52. ac := NewClient(conn)
  53. return ac, socket, func() {
  54. proc, _ := os.FindProcess(pid)
  55. if proc != nil {
  56. proc.Kill()
  57. }
  58. conn.Close()
  59. }
  60. }
  61. func testAgent(t *testing.T, key interface{}, cert *ssh.Certificate) {
  62. agent, _, cleanup := startAgent(t)
  63. defer cleanup()
  64. testAgentInterface(t, agent, key, cert)
  65. }
  66. func testAgentInterface(t *testing.T, agent Agent, key interface{}, cert *ssh.Certificate) {
  67. signer, err := ssh.NewSignerFromKey(key)
  68. if err != nil {
  69. t.Fatalf("NewSignerFromKey(%T): %v", key, err)
  70. }
  71. // The agent should start up empty.
  72. if keys, err := agent.List(); err != nil {
  73. t.Fatalf("RequestIdentities: %v", err)
  74. } else if len(keys) > 0 {
  75. t.Fatalf("got %d keys, want 0: %v", len(keys), keys)
  76. }
  77. // Attempt to insert the key, with certificate if specified.
  78. var pubKey ssh.PublicKey
  79. if cert != nil {
  80. err = agent.Add(key, cert, "comment")
  81. pubKey = cert
  82. } else {
  83. err = agent.Add(key, nil, "comment")
  84. pubKey = signer.PublicKey()
  85. }
  86. if err != nil {
  87. t.Fatalf("insert(%T): %v", key, err)
  88. }
  89. // Did the key get inserted successfully?
  90. if keys, err := agent.List(); err != nil {
  91. t.Fatalf("List: %v", err)
  92. } else if len(keys) != 1 {
  93. t.Fatalf("got %v, want 1 key", keys)
  94. } else if keys[0].Comment != "comment" {
  95. t.Fatalf("key comment: got %v, want %v", keys[0].Comment, "comment")
  96. } else if !bytes.Equal(keys[0].Blob, pubKey.Marshal()) {
  97. t.Fatalf("key mismatch")
  98. }
  99. // Can the agent make a valid signature?
  100. data := []byte("hello")
  101. sig, err := agent.Sign(pubKey, data)
  102. if err != nil {
  103. t.Fatalf("Sign(%s): %v", pubKey.Type(), err)
  104. }
  105. if err := pubKey.Verify(data, sig); err != nil {
  106. t.Fatalf("Verify(%s): %v", pubKey.Type(), err)
  107. }
  108. }
  109. func TestAgent(t *testing.T) {
  110. for _, keyType := range []string{"rsa", "dsa", "ecdsa"} {
  111. testAgent(t, testPrivateKeys[keyType], nil)
  112. }
  113. }
  114. func TestCert(t *testing.T) {
  115. cert := &ssh.Certificate{
  116. Key: testPublicKeys["rsa"],
  117. ValidBefore: ssh.CertTimeInfinity,
  118. CertType: ssh.UserCert,
  119. }
  120. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  121. testAgent(t, testPrivateKeys["rsa"], cert)
  122. }
  123. // netPipe is analogous to net.Pipe, but it uses a real net.Conn, and
  124. // therefore is buffered (net.Pipe deadlocks if both sides start with
  125. // a write.)
  126. func netPipe() (net.Conn, net.Conn, error) {
  127. listener, err := net.Listen("tcp", "127.0.0.1:0")
  128. if err != nil {
  129. return nil, nil, err
  130. }
  131. defer listener.Close()
  132. c1, err := net.Dial("tcp", listener.Addr().String())
  133. if err != nil {
  134. return nil, nil, err
  135. }
  136. c2, err := listener.Accept()
  137. if err != nil {
  138. c1.Close()
  139. return nil, nil, err
  140. }
  141. return c1, c2, nil
  142. }
  143. func TestAuth(t *testing.T) {
  144. a, b, err := netPipe()
  145. if err != nil {
  146. t.Fatalf("netPipe: %v", err)
  147. }
  148. defer a.Close()
  149. defer b.Close()
  150. agent, _, cleanup := startAgent(t)
  151. defer cleanup()
  152. if err := agent.Add(testPrivateKeys["rsa"], nil, "comment"); err != nil {
  153. t.Errorf("Add: %v", err)
  154. }
  155. serverConf := ssh.ServerConfig{}
  156. serverConf.AddHostKey(testSigners["rsa"])
  157. serverConf.PublicKeyCallback = func(c ssh.ConnMetadata, key ssh.PublicKey) (*ssh.Permissions, error) {
  158. if bytes.Equal(key.Marshal(), testPublicKeys["rsa"].Marshal()) {
  159. return nil, nil
  160. }
  161. return nil, errors.New("pubkey rejected")
  162. }
  163. go func() {
  164. conn, _, _, err := ssh.NewServerConn(a, &serverConf)
  165. if err != nil {
  166. t.Fatalf("Server: %v", err)
  167. }
  168. conn.Close()
  169. }()
  170. conf := ssh.ClientConfig{}
  171. conf.Auth = append(conf.Auth, ssh.PublicKeysCallback(agent.Signers))
  172. conn, _, _, err := ssh.NewClientConn(b, "", &conf)
  173. if err != nil {
  174. t.Fatalf("NewClientConn: %v", err)
  175. }
  176. conn.Close()
  177. }
  178. func TestLockClient(t *testing.T) {
  179. agent, _, cleanup := startAgent(t)
  180. defer cleanup()
  181. testLockAgent(agent, t)
  182. }
  183. func testLockAgent(agent Agent, t *testing.T) {
  184. if err := agent.Add(testPrivateKeys["rsa"], nil, "comment 1"); err != nil {
  185. t.Errorf("Add: %v", err)
  186. }
  187. if err := agent.Add(testPrivateKeys["dsa"], nil, "comment dsa"); err != nil {
  188. t.Errorf("Add: %v", err)
  189. }
  190. if keys, err := agent.List(); err != nil {
  191. t.Errorf("List: %v", err)
  192. } else if len(keys) != 2 {
  193. t.Errorf("Want 2 keys, got %v", keys)
  194. }
  195. passphrase := []byte("secret")
  196. if err := agent.Lock(passphrase); err != nil {
  197. t.Errorf("Lock: %v", err)
  198. }
  199. if keys, err := agent.List(); err != nil {
  200. t.Errorf("List: %v", err)
  201. } else if len(keys) != 0 {
  202. t.Errorf("Want 0 keys, got %v", keys)
  203. }
  204. signer, _ := ssh.NewSignerFromKey(testPrivateKeys["rsa"])
  205. if _, err := agent.Sign(signer.PublicKey(), []byte("hello")); err == nil {
  206. t.Fatalf("Sign did not fail")
  207. }
  208. if err := agent.Remove(signer.PublicKey()); err == nil {
  209. t.Fatalf("Remove did not fail")
  210. }
  211. if err := agent.RemoveAll(); err == nil {
  212. t.Fatalf("RemoveAll did not fail")
  213. }
  214. if err := agent.Unlock(nil); err == nil {
  215. t.Errorf("Unlock with wrong passphrase succeeded")
  216. }
  217. if err := agent.Unlock(passphrase); err != nil {
  218. t.Errorf("Unlock: %v", err)
  219. }
  220. if err := agent.Remove(signer.PublicKey()); err != nil {
  221. t.Fatalf("Remove: %v", err)
  222. }
  223. if keys, err := agent.List(); err != nil {
  224. t.Errorf("List: %v", err)
  225. } else if len(keys) != 1 {
  226. t.Errorf("Want 1 keys, got %v", keys)
  227. }
  228. }